• Online, Self-Paced
Course Description

Discover how cryptography can be used to provide confidentiality and integrity for data at rest and data in transit. Explore hashing, symmetric and asymmetric encryption, digital signatures, and secure protocols.

Learning Objectives

System Security Certified Practitioner (SSCP 2018): Cryptography Primer

  • Course Overview
  • explain how cryptography can protect IT solutions and how the implementation is often influenced by regulations
  • describe how hashing relates to integrity using algorithms such as HMAC
  • generate a hash for a file to ensure it is authentic and has not been corrupted
  • describe how key lengths relate to cryptographic strength
  • explain how symmetric encryption uses a single key to protect data
  • explain how asymmetric encryption uses related keys to protect data
  • describe ECC cryptography
  • provide examples of how malicious users can attack cryptographic implementations
  • describe how unique digital signatures provide message authenticity
  • explain when to use SSL/TLS, S/MIME, IPSec, and DKIM
  • configure IPSec in a Windows environment
  • demonstrate why Telnet remote administration should never be used
  • determine which cryptographic solutions best meets security needs

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.